Home
last modified time | relevance | path

Searched refs:eapKeyData (Results 1 – 11 of 11) sorted by relevance

/freebsd/contrib/wpa/src/eap_server/
H A Deap_server_tls.c334 u8 *eapKeyData; in eap_tls_getKey() local
350 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, label, in eap_tls_getKey()
353 if (eapKeyData) { in eap_tls_getKey()
356 eapKeyData, EAP_TLS_KEY_LEN); in eap_tls_getKey()
357 os_memset(eapKeyData + EAP_TLS_KEY_LEN, 0, EAP_EMSK_LEN); in eap_tls_getKey()
362 return eapKeyData; in eap_tls_getKey()
369 u8 *eapKeyData, *emsk; in eap_tls_get_emsk() local
385 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, label, in eap_tls_get_emsk()
388 if (eapKeyData) { in eap_tls_get_emsk()
391 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, in eap_tls_get_emsk()
[all …]
H A Deap_server_peap.c1350 u8 *eapKeyData; in eap_peap_getKey() local
1371 eapKeyData = os_malloc(EAP_TLS_KEY_LEN); in eap_peap_getKey()
1372 if (eapKeyData) { in eap_peap_getKey()
1373 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN); in eap_peap_getKey()
1376 eapKeyData, EAP_TLS_KEY_LEN); in eap_peap_getKey()
1384 return eapKeyData; in eap_peap_getKey()
1396 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, in eap_peap_getKey()
1399 if (eapKeyData) { in eap_peap_getKey()
1400 os_memset(eapKeyData + EAP_TLS_KEY_LEN, 0, EAP_EMSK_LEN); in eap_peap_getKey()
1403 eapKeyData, EAP_TLS_KEY_LEN); in eap_peap_getKey()
[all …]
H A Deap_server.c238 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); in SM_STATE()
239 sm->eap_if.eapKeyData = NULL; in SM_STATE()
520 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); in SM_STATE()
522 sm->eap_if.eapKeyData = sm->m->getKey( in SM_STATE()
526 sm->eap_if.eapKeyData = NULL; in SM_STATE()
673 if (sm->eap_if.eapKeyData) in SM_STATE()
769 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); in erp_send_finish_reauth()
771 sm->eap_if.eapKeyData = os_malloc(erp->rRK_len); in erp_send_finish_reauth()
772 if (!sm->eap_if.eapKeyData) in erp_send_finish_reauth()
780 sm->eap_if.eapKeyData, erp->rRK_len) < 0) { in erp_send_finish_reauth()
[all …]
H A Deap_server_fast.c1566 u8 *eapKeyData; in eap_fast_getKey() local
1571 eapKeyData = os_malloc(EAP_FAST_KEY_LEN); in eap_fast_getKey()
1572 if (eapKeyData == NULL) in eap_fast_getKey()
1575 if (eap_fast_derive_eap_msk(data->simck, eapKeyData) < 0) { in eap_fast_getKey()
1576 os_free(eapKeyData); in eap_fast_getKey()
1581 return eapKeyData; in eap_fast_getKey()
1588 u8 *eapKeyData; in eap_fast_get_emsk() local
1593 eapKeyData = os_malloc(EAP_EMSK_LEN); in eap_fast_get_emsk()
1594 if (eapKeyData == NULL) in eap_fast_get_emsk()
1597 if (eap_fast_derive_eap_emsk(data->simck, eapKeyData) < 0) { in eap_fast_get_emsk()
[all …]
H A Deap_server_ttls.c1274 u8 *eapKeyData; in eap_ttls_getKey() local
1291 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, in eap_ttls_getKey()
1294 if (eapKeyData) { in eap_ttls_getKey()
1297 eapKeyData, EAP_TLS_KEY_LEN); in eap_ttls_getKey()
1302 return eapKeyData; in eap_ttls_getKey()
1328 u8 *eapKeyData, *emsk; in eap_ttls_get_emsk() local
1345 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, in eap_ttls_get_emsk()
1348 if (eapKeyData) { in eap_ttls_get_emsk()
1351 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, in eap_ttls_get_emsk()
1353 bin_clear_free(eapKeyData, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); in eap_ttls_get_emsk()
H A Deap_server_teap.c2037 u8 *eapKeyData; in eap_teap_getKey() local
2042 eapKeyData = os_malloc(EAP_TEAP_KEY_LEN); in eap_teap_getKey()
2043 if (!eapKeyData) in eap_teap_getKey()
2049 eapKeyData) < 0) { in eap_teap_getKey()
2050 os_free(eapKeyData); in eap_teap_getKey()
2055 return eapKeyData; in eap_teap_getKey()
2062 u8 *eapKeyData; in eap_teap_get_emsk() local
2067 eapKeyData = os_malloc(EAP_EMSK_LEN); in eap_teap_get_emsk()
2068 if (!eapKeyData) in eap_teap_get_emsk()
2074 eapKeyData) < 0) { in eap_teap_get_emsk()
[all …]
H A Deap.h63 u8 *eapKeyData; member
/freebsd/contrib/wpa/src/eap_peer/
H A Deap.c109 if (sm->eapKeyData) { in eap_sm_free_key()
110 bin_clear_free(sm->eapKeyData, sm->eapKeyDataLen); in eap_sm_free_key()
111 sm->eapKeyData = NULL; in eap_sm_free_key()
938 sm->eapKeyData = sm->m->getKey(sm, sm->eap_method_priv, in SM_STATE()
1051 if (sm->eapKeyData != NULL) in SM_STATE()
1989 sm->eapKeyData = os_malloc(erp->rRK_len); in eap_peer_finish()
1990 if (!sm->eapKeyData) in eap_peer_finish()
1999 sm->eapKeyData, erp->rRK_len) < 0) { in eap_peer_finish()
2005 sm->eapKeyData, sm->eapKeyDataLen); in eap_peer_finish()
3065 if (sm->eapKeyData != NULL) in eap_notify_lower_layer_success()
[all …]
H A Deap_i.h336 u8 *eapKeyData; /* peer to lower layer */ member
/freebsd/contrib/wpa/src/radius/
H A Dradius_server.c941 if (code == RADIUS_CODE_ACCESS_ACCEPT && sess->eap_if->eapKeyData) { in radius_server_encapsulate_eap()
950 sess->eap_if->eapKeyData, len); in radius_server_encapsulate_eap()
963 sess->eap_if->eapKeyData, len); in radius_server_encapsulate_eap()
980 sess->eap_if->eapKeyData + len, in radius_server_encapsulate_eap()
981 len, sess->eap_if->eapKeyData, in radius_server_encapsulate_eap()
/freebsd/contrib/wpa/src/ap/
H A Dieee802_1x.c266 if (!sm->eap_if->eapKeyData || sm->eap_if->eapKeyDataLen < 64) { in ieee802_1x_tx_key_one()
281 os_memcpy(ekey + sizeof(key->key_iv), sm->eap_if->eapKeyData, 32); in ieee802_1x_tx_key_one()
294 hmac_md5(sm->eap_if->eapKeyData + 32, 32, buf, sizeof(*hdr) + len, in ieee802_1x_tx_key_one()
312 if (!sm || !sm->eap_if->eapKeyData) in ieee802_1x_tx_key()
2798 return sm->eap_if->eapKeyData; in ieee802_1x_get_key()